Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design

被引:22
|
作者
Liu, Jianghua [1 ]
Ma, Jinhua [1 ]
Wu, Wei [1 ]
Chen, Xiaofeng [2 ]
Huang, Xinyi [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile health records (MHRs); embedded devices (EDs); cloud computing; online/offline attribute-based signature; ATTRIBUTE-BASED SIGNATURES; PRIVACY; SCHEME;
D O I
10.1145/2983625
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic healthcare (eHealth) systems have replaced traditional paper-based medical systems due to attractive features such as universal accessibility, high accuracy, and low cost. As a major constituent part of eHealth systems, mobile healthcare (mHealth) applies Mobile Internet Devices (MIDs) and Embedded Devices (EDs), such as tablets, smartphones, and other devices embedded in the bodies of individuals, to improve the quality of life and provide more convenient healthcare services for patients. Unfortunately, MIDs and EDs have only limited computational capacity, storage space, and power supply. By taking this into account, we present a new design to guarantee the integrity of eHealth records and the anonymity of the data owner in a more efficient and flexible way. The essence of our design is a general method which can convert any secure Attribute-Based Signature (ABS) scheme into a highly efficient and secure Online/Offline Attribute-Based Signature (OOABS) scheme. We prove the security and analyze the efficiency improvement of the new design. Additionally, we illustrate the proposed generic construction by applying it to a specific ABS scheme.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Efficient and Secure Outsourced Image Watermarking in Cloud Computing
    Fang, Xiongjie
    Lai, Ruopan
    Zhou, Zhipeng
    Chen, Ziyang
    Zheng, Peijia
    Lu, Wei
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 526 - 537
  • [42] SECURE : Efficient resource scheduling by swarm in cloud computing
    Singh, Harvinder
    Bhasin, Anshu
    Kaveri, Parag
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 127 - 137
  • [43] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066
  • [44] Efficient and secure BIG data delivery in Cloud Computing
    Christos Stergiou
    Kostas E. Psannis
    Multimedia Tools and Applications, 2017, 76 : 22803 - 22822
  • [45] Secure Storing of E-Health Records in the Cloud
    Wiedemann, Fabian
    Gaedke, Martin
    ENGINEERING THE WEB IN THE BIG DATA ERA, 2015, 9114 : 635 - 638
  • [46] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [47] Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Li, Ming
    Yu, Shucheng
    Zheng, Yao
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) : 131 - 143
  • [48] Development of a Secure Mobile Cloud Computing Model for Universities Services
    Elfurgani, Zuhra B. M.
    Bin Abdullah, Ismail
    ADVANCED SCIENCE LETTERS, 2016, 22 (08) : 1948 - 1951
  • [49] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [50] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTER NETWORKS, 2014, 65 : 99 - 110